SPARK: Static Program Analysis Reasoning and Retrieving Knowledge Authors: Wasuwee Sodsong, Bernhard Scholz, Sanjay Chawla | Published: 2017-11-03 2017.11.03 2025.04.03 文献データベース
Provable defenses against adversarial examples via the convex outer adversarial polytope Authors: Eric Wong, J. Zico Kolter | Published: 2017-11-02 | Updated: 2018-06-08 2017.11.02 2025.04.03 文献データベース
BinPro: A Tool for Binary Source Code Provenance Authors: Dhaval Miyani, Zhen Huang, David Lie | Published: 2017-11-02 2017.11.02 2025.04.03 文献データベース
Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection Authors: Mario Di Mauro, Cesario Di Sarno | Published: 2017-11-01 2017.11.01 2025.04.03 文献データベース
Attacking Binarized Neural Networks Authors: Angus Galloway, Graham W. Taylor, Medhat Moussa | Published: 2017-11-01 | Updated: 2018-01-31 2017.11.01 2025.04.03 文献データベース
Attacking the Madry Defense Model with $L_1$-based Adversarial Examples Authors: Yash Sharma, Pin-Yu Chen | Published: 2017-10-30 | Updated: 2018-07-27 2017.10.30 2025.04.03 文献データベース
Certifying Some Distributional Robustness with Principled Adversarial Training Authors: Aman Sinha, Hongseok Namkoong, Riccardo Volpi, John Duchi | Published: 2017-10-29 | Updated: 2020-05-01 2017.10.29 2025.04.03 文献データベース
Interpretation of Neural Networks is Fragile Authors: Amirata Ghorbani, Abubakar Abid, James Zou | Published: 2017-10-29 | Updated: 2018-11-06 2017.10.29 2025.04.03 文献データベース
Context-Aware Generative Adversarial Privacy Authors: Chong Huang, Peter Kairouz, Xiao Chen, Lalitha Sankar, Ram Rajagopal | Published: 2017-10-26 | Updated: 2017-12-03 2017.10.26 2025.04.03 文献データベース
Maximum Principle Based Algorithms for Deep Learning Authors: Qianxiao Li, Long Chen, Cheng Tai, Weinan E | Published: 2017-10-26 | Updated: 2018-06-02 2017.10.26 2025.04.03 文献データベース